1. Permission Scanner: All Apps will be secured with the Pin No. so that any remote user attempt will failed to open the App. In this Module Permission scanner scans permission for all the installed application, for that, it need to get the list of all the installed application. We can access all installed App from the appList stores after that for each item in the list permission are fetched and the details for these permissions. With each installed application an indication is displayed to show the danger level for that app and user could uninstall the application by long pressing on the name.
2. Settings Checker :Some time user enable the USB Debugging and Application install from unknown sources that may leads to get Android phone tempered by the hacker or any other Service and unsecured App to fix this problem system have a module to for setting Checker. Settings Checker scans the Device's settings, using the Settings. Secure API provided by Android. It can be used to fetch settings for different parameters, check if USB Debugging is enabled, similarly if Application install from unknown sources is permitted. Settings Checker also has a background service, implemented using Android's Alarm Manager class, which performs automated checks at regular time intervals. By default, the interval is set to 1 Day. It can be changed in the settings to a Week, Fortnight or a Month. if the service scans and finds that any of the setting is not set to its optimal value, it fires a notification. Upon clicking this notification, the user is taken to the Settings Checker fragment, wherein he can fix the respective settings.
. Broadcast Receivers: The broadcast receivers are used to keep check on the malicious activities, for example unaware message sending, premium calls, execution of harmful USSDs etc. These Broadcast receiver includes a. Call Recepter b. SMS Recepter c. Outgoing SMS Recepter a. Call Recepter: is used to intercept incoming and outgoing calls. Every call that is placed by any application is passed through this receiver and then it checks if the called number meets the requirement set by the user i.e. if the number is saved in users contact details or is not present in the user’s blacklist. User could access the preferences regarding call blocker in the settings. Any call not meeting the requirement is logged in the Call logs and is shown in the blocker logs, with the reason for the blocking. b. SMS Recepter: It does pretty much the same but with messages. The receiver can only handle received messages, for outgoing messages another service is used because the Android mechanism for outgoing SMSs are different. In case of calls the calls could be blocked or cancelled but for messages its different and specially with outgoing messages. There is no way yet known which could be used to alter the content of outgoing messages, or better block them. The Incoming SMS are deemed malicious and is reported to the user, if the message content contains numbers that are not saved in the contact list of user. c. Outgoing SMS Recepter: checks if the outgoing SMS is sent by the user of if the message is sent by some other application. If latter is true a notification is generated giving the application name which sent the message, also the content of the message it sent
7. Smart Alarm According to Geo-Fencing : Geo-fencing is the most resource intensive service, it controls the device lock, and wiping of data. Moreover, it asks you to enable GPS for better location tracking. The class that does most of the work is GPS Tracker class, this class gets the current device location from the GPS or network provider whichever is available. Using the location Geo Fencing service keeps track of the device, if it is still inside the virtual fence or moved out of it. After the service is started the location is queried every 10 seconds. That’s not too much battery draining but also not losing the timely location tracking that’s needed. When Smart phone is stolen and make start from remote location using the Geo Fencing device location the App will determined that is device found to be out of the fence, it checks the location 3 more times and when it confirms the phone is out of the fence, it activates the alarming sound using Alarm Manager. Similarly, current location is sent to a secure number set by user enables the feature. As this service requires a working GPS, a prompt is made if GPS is unavailable and unless user enables the GPS the service is inaccessible. A secure number is required to enable the service to get location and Device Administrator privilege is also must. 8. Remote Lock / Wipe: When the smart device is stolen then it is most urgent to lock and wipe the users most important data. To overcome this problem we user the Geo-fencing that requires user to enable the service first but if the user forgets to enable the service he could still lock or wipe data of his phone using remote wipe. Remote wipe uses the same locking mechanism of Device Policy Manager. It uses the same broadcast receiver created for received SMSs. The receiver checks the message for the secret code set by the user, if the message contains the secret code, it activates the remote services and locks the device and if enabled wipes the user data from the device. For sending current location, current location is fetched using GPS Tracker, and using SMS Manager API a SMS is sent to the secure number that user believes could be reached in case the user’s device is stolen. The secret code is stored in application preferences which is retrieved each time is a new message is received to check if the message contains the secret code.
Project working video